Pkg Acc Infor Systems MS VISIO CD
10th Edition
ISBN: 9781133935940
Author: Ulric J. Gelinas
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 1SP
Summary Introduction
To compare: The barcodes and RFID.
Introduction:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(e)A company’s programming staff wrote custom code for the shopping cart feature on its website. The code contained a vulnerability that could be exploited when the customer typed in the ship-to address.
Assume that you produce plastic computer pieces for computer companies. The pieces require very little technology. Where would you like to establish DFI? (The point of this question is to force consideration of various characteristics that are incorporated in a DFI decision.)
Systems Analysis
Consider the following dialogue between a systems professional, Joe Pugh, and a manager of a department targeted for a new information system, Lars Meyer: Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers perform their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system. Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not. Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up-front determining exactly what we want the system to do for my department. Then you systems people can come in and determine what…
Chapter 12 Solutions
Pkg Acc Infor Systems MS VISIO CD
Ch. 12 - Prob. 1RQCh. 12 - What primary functions does the purchasing process...Ch. 12 - Prob. 3RQCh. 12 - What are the fundamental responsibilities of each...Ch. 12 - Describe supply chain management (SCM).Ch. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - What types of frauds are typically found in the...Ch. 12 - What are the typical effectiveness goals of the...Ch. 12 - What characterizes a valid PO input? What...Ch. 12 - Prob. 15RQCh. 12 - Describe the impact that entity-level controls...Ch. 12 - Prob. 1DQCh. 12 - Explain why ambiguities and conflicts exist among...Ch. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 1SPCh. 12 - Prob. 2SPCh. 12 - Prob. 3SPCh. 12 - Prob. 4SPCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6P
Knowledge Booster
Similar questions
- Consider the following dialogue between a systems professional, Joe Pugh, and a manager of a department tar- geted for a new information system, Lars Meyer:Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers performing their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system.Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not.Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up front determining exactly what we want the system to do for my department. Then, you systems people can come in and determine what portions to…arrow_forwardEmery Communications Company is considering the production and marketing of a communications system that will increase the efficiency of messaging for small businesses or branch offices of large companies. Each unit hooked into the system is assigned a mailbox number, which can be matched to a telephone extension number, providing access to messages 24 hours a day. Up to 20 units can be hooked into the system, allowing the delivery of the same message to as many as 20 people. Personal codes can be used to make messages confidential. Furthermore, messages can be reviewed, recorded, cancelled, replied to, or deleted all during the same message playback. Indicators wired to the telephone blink whenever new messages are present. To produce this product, a $1.75 million investment in new equipment is required. The equipment will last 10 years but will need major maintenance costing $150,000 at the end of its sixth year. The salvage value of the equipment at the end of 10 years is estimated…arrow_forwardGeneral Controls. Indicate the benefits of each of the following examples of general controls. a. Echo checks are designed and built into the computer by the manufacturer.b. The company schedules regular maintenance on its computer hardware.c. The company involves users in its design of programs and selection of prepackaged software and programs.d. New programs are tested and validated prior to being implemented.e. Documentation is required prior to modifying existing programs using “emergency”change orders.f. The duties of system analysts, programmers, and computer operators are appropriatelyseparated.g. Appropriate backup and data retention policies are implemented.h. The access rights granted to employees are periodically reviewed and evaluated, giving consideration to known changes resulting from promotions and transfers within the company.arrow_forward
- has hired you to review its sales order procedures for internal control compliance and to make recommendations for changes. You are required to:a. Create a data flow diagram of the current system. b. Create a system flowchart of the existing system. c. Analyze the internal control weaknesses in the system. ; andd. Prepare a system flowchart of a redesigned computer-based systemarrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Cyber sleuths need the following skills: a. Ability to do complex programming so they can develop their own software to examine corporate data and records. b. Ability to follow a trail, think analytically, and be thorough. c. Ability to use their computer engineering experience to evaluate the hardware used by the company d. Ability to think like a fraud perpetrator and use hacking tools and techniques. e. Ability to use their legal training to properly prepare the evidence needed to prosecute perpetratorsarrow_forwardConsider an organisation that wishes to select a vendor to supply a software package. The requirements will be complex, and the client will need considerable help from the vendor to configure and implement the software. Which one of the following actions would you advise against the client doing? Collect user requirements after the vendor has been selected, but before gap analysis Consider engaging the selected vendor in a software maintenance contract after the package has been successfully implemented Perform due diligence before selecting a vendor Put out an RFP to short-listed vendor candidatesarrow_forward
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (f) A company purchased the leading “off-the-shelf” e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the database by entering appropriate SQL code.arrow_forwardWhich of the following is a risk to the financial statement of a company when it places a purchase order with a supplier? The advantages of PDF files are: A. that they can be securely locked so that the figures cannot be changed.B. that they can be easily manipulated and changed by users.C. the software to produce them is very cheap.D. none of the options are correct. 2. What is information overload? A. The situation where a computer has more information than is needed or is able to be processed in a meaningful way when a computer program is executed.B. The situation where an individual has more information than is needed or is able to be processed in a meaningful way when working through a decision.C. The situation where a computer has more information than is needed or is able to be processed when data storage is taking place.D. The situation where the amount of information exceeds the storage capacity of the brain of a human being. 3. When all data are stored in a central place,…arrow_forwardSTUDY QUESTIONS Why is human behavior considered one of the biggest potential threats to operating system integrity? What are the issues that need to be considered before implementing keystroke monitoring? Describe the three ways on how an audit trail can be used to support security objectives. Explain how poorly designed audit trail logs can actually be dysfunctional. Why would a systems programmer create a back door if he or she has access to the program in his or her day-to-day tasks? PROBLEMS Problem 1: Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) can be used to help detect this type of fraud? Problem 2: In 2002, Mr. Rollerball started Mighty Mouse,…arrow_forward
- For a small brick-and-mortar store, what would be a realistic price for creating an online store for the owners, as well as risk assessments associated with said website (power failure, user error, etc)?arrow_forwardOne way ERP vendors help to make the configuration process easier for their customers is to: All of the above. develop built-in configuration tools to address most of their customers' needs for system changes. encourage their customers to use decentralized databases. train their customers to use an existing system and build interfaces between it and their ERP system.arrow_forwardHow difficult is it to expand the original RedBrandmodel? Answer this by adding a new plant, two newwarehouses, and three new customers, and modify thespreadsheet model appropriately. You can make up therequired input data.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,